Ransomware (stealing your documents or data and holding if for ransom)

This link, as well as the list below, will assist you in protecting yourself from threats and trends like those listed above.

What Can You Do?

Use the following sound cyber security practices to to help defend against the myriad of challenges and mitigate potential impacts of incidents:

Ensure that you have encryption and password features enabled on your smart phones and other mobile devices. Use strong passwords that combine upper and lower case letters, numbers, and special characters, and do not share them with anyone.

Use and regularly update firewalls and anti-virus/anti-spyware programs.

Be cautious about all communications; think before you click. Use common sense when communicating with users you DO and DO NOT know. Do not open email or related attachments from untrusted sources.

Don't reveal too much information about yourself on social media websites. Depending on the information you reveal, you could become the target of identity or property theft. Be wary of scams, such as fake profiles designed to exploit your trust.

Organizations considering a move to a cloud-based environment should fully research the risks and benefits of cloud computing before moving to that environment. It is critical that your security requirements are addressed in contractual agreements in advance.

Allow access to systems and data only by those who need it; protect those access credentials.